• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Outline the Data Protection Act and give examples of breaches.

Extracts from this document...


´╗┐MATTHEW ALLEN N5 Data Protection Act What is it? With the growth of information in technology, large databases are needed to hold the huge amounts of information. Global networks are used to share and distribute this information around the world in seconds. In order to control this and to protect people?s right to privacy, the Data Protection Act was introduced in 1984. The 8 basic principles: http://ico.org.uk/for_organisations/data_protection/the_guide/the_principles Data should? 1. Not be transferred to countries that do not have suitable data protection laws - There are similar data protection rules in all European Union countries. It is therefore acceptable to transfer personal data to another EU country, as it will still be protected. However, this principle refers to the European Economic Area (EEA) - this includes Iceland, Norway and Liechtenstein. (http://www.soas.ac.uk/infocomp/dpa/policy/outside/). Others countries, such as the United States, have not got suitable data protection laws either so personal data should not be sent to these countries. ...read more.


1. Be processed within the rights of data subjects - There are other vital privacy rights, as well as the Data Protection Act. These include the right to confidentiality. These affect how personal information can be used by companies. 1. Be obtained for specified and lawful purposes - This adds that the company must have a specific reason for processing data. Also, the data can only be processed for that purpose and no other. 1. Be adequate, relevant and not excessive for the purpose - This means that companies should collect the right amount of information for the fulfil purpose - no more and no less. In order to check whether they are collecting too much data, they look at the data and consider which pieces of information are absolutely critical in order to enable them to do whatever it is they are trying to do. Whatever is left can't be critical, so it would be unnecessary and it therefore should be disposed of. ...read more.


The forces could be punished under the data protection act. G4S (the security firm) said all files had been deleted, but this will come as no reassurance as they may not be trustworthy. (http://www.bbc.co.uk/news/uk-england-22265315). A statement said the data sent went over what was required, breaching the data protection act’s principles. This is therefore a breach of the act and a criminal investigation will occur as a result – to see who is to blame before action is taken. 1. A GP's receptionist who accessed sensitive medical information about her ex-husband's new wife has admitted breaching data protection law. She was fined £750. The two medical documents she accessed were referred to as highly confidential. www.publicservice.co.uk/news_story.asp?id=22417. Everybody expects their doctors to be confidential but the information was accessed by someone else. The victim of this crime feels betrayed and vulnerable as someone she barely knows, knows private information about her. What has happened can’t be undone and the fine of £750 will only give a small amount of satisfaction – some will feel that the charge was rather lenient. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Data Protection Act

    A lot of the data protection act is applied to how collected data is used. If a worker was to access a member's details to get their phone number then they would be breaking the law. This law applies to all the workers of blockbuster.

  2. Data Protection Act

    However, finding out information is not necessarily free. It can cost over ´┐Ż10.00 to find out what data is being held. Exemptions are the information on company or other topics and all done manual system and the information held on personal computer systems for household use only. The act is primarily concerned with data held in the UK

  1. The Data Protection Act 1998 - questions and answers

    This applies to all processing except where you can rely on an exemption. Some examples of the conditions for processing are: the individual has consented to the processing; or the processing is necessary for the performance of a contract to which the individual is a party; or it is necessary

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    LAW NO.2: COMPUTER MISUSE ACT (1990) This act avoids the misuse of computer, which is a common technology used by many users world wide. Since the technology is being used very commonly by many individuals globally, people are now using the computer for reasons that may cause harm to other

  1. Privacy and Data Protection: IT Law

    strong human rights approach on the one side, and the UK, Denmark and Ireland, not wanting to go further than the Council's Convention of 1981 on the other side. Heavy lobbying of the banking sector and the medical research sector did not make things easier.14 Not till 1995 did the EU manage to enact the Data Protection Directive.

  2. Legal Aspects of Using Information Technology

    ...be processed fairly and lawfully 2) ...be obtained for specified and lawful purposes 3) ...be adequate, relevant and not excessive for the purpose 4) ...be accurate and up-to-date 5) ...not be kept longer than necessary 6) ...be processed within the rights of data subjects 7)

  1. ICT - Data Protection

    The Data Protection Act was developed to give protection and lay down rules about how data about people can be used. Usually this data is stored on a computer. The Data Protection Act 1998 covers: - Information or data - stored on a computer or an organised paper filing system - about living people.

  2. Data Protection Issues – Compliance Within Computing Organisations, The Causes, Effects and Consequences.

    Since the introduction of the Data Protection Act in the United Kingdom in 1984, this enforceable piece of legislation has carried with it severe penalties for being in default of it. Recently repealed by the latest Act of 1998 (implemented 1st March 2000), and accessible for viewing at the following online internet location: http://www.legislation.hmso.gov.uk/acts/acts1998/19980029.htm.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work